vulnerability
Amazon Linux 2023: CVE-2022-34903: Medium priority package update for gnupg2
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | Jun 30, 2022 | Feb 17, 2025 | Jul 9, 2025 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
Jun 30, 2022
Added
Feb 17, 2025
Modified
Jul 9, 2025
Description
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
A vulnerability was found in GnuPG. This issue occurs due to an escape detection loop at the write_status_text_and_buffer() function in g10/cpr.c. This flaw allows a malicious actor to bypass access control.
A vulnerability was found in GnuPG. This issue occurs due to an escape detection loop at the write_status_text_and_buffer() function in g10/cpr.c. This flaw allows a malicious actor to bypass access control.
Solutions
amazon-linux-2023-upgrade-gnupg2amazon-linux-2023-upgrade-gnupg2-debuginfoamazon-linux-2023-upgrade-gnupg2-debugsourceamazon-linux-2023-upgrade-gnupg2-minimalamazon-linux-2023-upgrade-gnupg2-minimal-debuginfoamazon-linux-2023-upgrade-gnupg2-smimeamazon-linux-2023-upgrade-gnupg2-smime-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.